Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Juniper Networks — Vulnerabilities & Security Advisories 893

Browse all 893 CVE security advisories affecting Juniper Networks. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Juniper Networks operates as a global provider of networking hardware, software, and services, primarily focusing on enterprise and service provider infrastructure. With 893 recorded Common Vulnerabilities and Exposures, the company’s attack surface reflects the complexity of its extensive product portfolio. Historically, vulnerabilities in its systems have frequently involved remote code execution, cross-site scripting, and privilege escalation flaws, often stemming from input validation errors or improper access controls in management interfaces. Notable incidents include critical flaws in ScreenOS and Junos OS that allowed attackers to bypass authentication or execute arbitrary commands, highlighting risks in legacy and core routing platforms. These issues underscore the necessity for rigorous patch management and secure configuration practices. As a foundational element of global internet infrastructure, the security posture of Juniper Networks directly impacts the stability and integrity of connected networks worldwide, necessitating continuous monitoring and proactive defense strategies.

CVE IDTitleCVSSSeverityPublished
CVE-2021-31376 Junos OS: ACX Series: Packet Forwarding Engine manager (FXPC) process crashes when processing DHCPv6 packets — Junos OSCWE-20 7.5 High2021-10-19
CVE-2021-31375 Junos OS: Receipt of a specific BGP update may cause RPKI policy-checks to be bypassed — Junos OSCWE-358 7.2 High2021-10-19
CVE-2021-31374 Junos OS and Junos OS Evolved: RPD crash while processing a specially crafted BGP UPDATE or KEEPALIVE message. — Junos OSCWE-787 7.5 High2021-10-19
CVE-2021-31373 Junos OS: SRX Series: Persistent XSS vulnerability in J-Web — Junos OSCWE-20 8.0 High2021-10-19
CVE-2021-31372 Junos OS: J-Web allows a locally authenticated attacker to escalate their privileges to root. — Junos OSCWE-20 8.8 High2021-10-19
CVE-2021-31371 Junos OS: QFX5000 Series: Traffic from the network internal to the device (128.0.0.0) may be forwarded to egress interfaces. — Junos OSCWE-200 5.3 Medium2021-10-19
CVE-2021-31370 Junos OS: QFX5000 Series and EX4600 Series: Control traffic might be dropped if a high rate of specific multicast traffic is received — Junos OSCWE-184 6.5 Medium2021-10-19
CVE-2021-31369 Junos OS: MX Series: Traffic drops will be observed if MS-MPC/MS-PIC resources are consumed by certain traffic causing a partial DoS — Junos OSCWE-770 5.3 Medium2021-10-19
CVE-2021-31368 Junos OS: EX2300 Series, EX3400 Series, and ACX710 might become unresponsive if the out-of-band management port receives a flood of traffic — Junos OSCWE-400 7.5 High2021-10-19
CVE-2021-31367 Junos OS: PTX Series: An FPC heap memory leak will be triggered by certain Flowspec route operations which can lead to an FPC crash — Junos OSCWE-401 6.5 Medium2021-10-19
CVE-2021-31366 Junos OS: MX Series: In subscriber management / BBE configuration authd can crash if a subscriber with a specific username tries to login leading to a DoS — Junos OSCWE-252 6.5 Medium2021-10-19
CVE-2021-31365 Junos OS: EX2300, EX3400 and EX4300 Series: An Aggregated Ethernet (AE) interface will go down due to a stream of specific layer 2 frames — Junos OSCWE-400 6.5 Medium2021-10-19
CVE-2021-31364 Junos OS: SRX Series: The flowd process will crash if log session-close is configured and specific traffic is received — Junos OSCWE-754 5.9 Medium2021-10-19
CVE-2021-31363 Junos OS and Junos OS Evolved: Receipt of a specific LDP message will cause a Denial of Service — Junos OSCWE-835 6.5 Medium2021-10-19
CVE-2021-31362 Junos OS and Junos OS Evolved: An IS-IS adjacency might be taken down if a bad hello PDU is received for an existing adjacency causing a DoS — Junos OSCWE-693 6.5 Medium2021-10-19
CVE-2021-31361 Junos OS: QFX Series and PTX Series: FPC resource usage increases when certain packets are processed which are being VXLAN encapsulated — Junos OSCWE-754 5.3 Medium2021-10-19
CVE-2021-31360 Junos OS and Junos OS Evolved: Denial of Service vulnerability in local file processing — Junos OSCWE-269 7.1 High2021-10-19
CVE-2021-31359 Junos OS and Junos OS Evolved: Local Privilege Escalation vulnerability — Junos OSCWE-269 7.8 High2021-10-19
CVE-2021-31358 Junos OS Evolved: shell-injection vulnerabilities in evo_sftp UI wrapper script — Junos OS EvolvedCWE-77 7.8 High2021-10-19
CVE-2021-31357 Junos OS Evolved: shell-injection vulnerabilities in evo_tcpdump UI wrapper script — Junos OS EvolvedCWE-77 7.8 High2021-10-19
CVE-2021-31356 Junos OS Evolved: Multiple shell-injection vulnerabilities in EVO UI wrapper scripts — Junos OS EvolvedCWE-77 7.8 High2021-10-19
CVE-2021-31355 Junos OS: Stored Cross-Site Scripting (XSS) vulnerability in captive portal — Junos OSCWE-79 8.0 High2021-10-19
CVE-2021-31354 Junos OS and Junos OS Evolved: A vulnerability in the Juniper Agile License Client may allow an attacker to perform Remote Code Execution (RCE) — Junos OSCWE-125 7.1 High2021-10-19
CVE-2021-31353 Junos OS and Junos OS Evolved: RPD core upon receipt of specific BGP update — Junos OSCWE-755 7.5 High2021-10-19
CVE-2021-31352 SRC Series: NETCONF over SSH allows negotiation of weak ciphers — SRC SeriesCWE-200 5.3 Medium2021-10-19
CVE-2021-31351 Junos OS: MX Series: Receipt of specific packet on MS-MPC/MS-MIC causes line card reset — Junos OSCWE-754 7.5 High2021-10-19
CVE-2021-31350 Junos OS and Junos OS Evolved: Privilege escalation vulnerability in Juniper Extension Toolkit (JET) — Junos OSCWE-269 7.5 High2021-10-19
CVE-2021-31349 Session Smart Router: Authentication Bypass Vulnerability — 128 Technology Session Smart RouterCWE-287 9.8 Critical2021-10-19
CVE-2021-0299 Junos OS: Kernel crash (vmcore) upon receipt of a malformed IPv6 packet — Junos OSCWE-755 7.5 High2021-10-19
CVE-2021-0298 Junos OS Evolved: PTX10003, PTX10008: picd core while executing the "show chassis pic" command under certain conditions — Junos OS EvolvedCWE-362 4.7 Medium2021-10-19

This page lists every published CVE security advisory associated with Juniper Networks. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.